Bitcoin Forum
May 31, 2024, 01:45:27 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 695 »
21  Bitcoin / Press / [2016-06-02] CD: Bitcoin is a New Kind of Asset Class on: June 02, 2016, 05:22:43 PM
Coinbase and ARK Invest Report Argues Bitcoin is a New Kind of Asset Class

A new report argues that bitcoin should be considered the first in an entirely new kind of asset class.

http://www.coindesk.com/coinbase-ark-invest-bitcoin-new-asset-class/
22  Bitcoin / Press / [2016-06-02] Video: Vinay Gupta- Blockchain Beyond Bitcoin on: June 02, 2016, 05:13:18 PM
Vinay Gupta- Blockchain Beyond Bitcoin

https://www.youtube.com/watch?v=YaH5HDhtWo4&feature=youtu.be
23  Local / Anfänger und Hilfe / Re: Welcher Bitcoin Marktplatz on: June 02, 2016, 03:54:53 PM
Hallo, habe bis jetzt meine Bitcoins nur bei Anbietern wie anycoindirect gekauft. Wollte jetzt aber auf einen richtigen Marktplatz wie bspw. Kraken umsteigen. Welchen koennt ihr empfehlen? Mir geht es hauptsaechlich darum, dass ich schnell Bitcoins kaufen kann. Bei den meisten wird aber wohl nur SEPA gehen oder?

LG

Bitstmap oder Kraken sind in ordnung. bitcoin.de würde ich nicht nehmen, da ich persönlich nicht direkt mit anderen personen handeln will sondern eine reine exchange bevorzuge. außerdem sind die limits weit aus höher bei reinen exchanges.

kraken ist von der oberfläche her unübersichtlicher als bitstamp. dafür kannst du bei kraken altcoins handeln.
24  Local / Anfänger und Hilfe / Re: Bitcoin.de Konto löschen und neues erstellen? Transaktionslimit resettet? on: June 02, 2016, 03:53:00 PM
ich vermute, dass es mit einem löschen und neuerstellen nicht getan ist da deine daten alle hinterlegt sind. letztlich kann nur der kundenservice deine fragen beantworten.

ich würde mich auf Bitstamp oder Kraken registrieren und dort (fast ohne) limits kaufen/verkaufen. der kurs wird sicher noch eine weile so niedrig bleiben  Grin
25  Bitcoin / Bitcoin Discussion / Re: Bitcoin Halving Party 2016 on: June 02, 2016, 03:47:00 PM
I'm gonna start partying on June 21 and keep going as long as it takes ...

count me in.


@the_poet

irc would be good.  Smiley
26  Bitcoin / Press / [2016-06-02] Understanding the Lightning Network on: June 02, 2016, 03:38:45 PM
Understanding the Lightning Network

The Lightning Network is probably the most highly anticipated technological innovation to be deployed on top of Bitcoin. The payment layer, first proposed by Joseph Poon and Tadge Dryja about a year ago, promises to support a virtually unlimited number of off-chain transactions among users, at nearly no cost – while leveraging the security offered by Bitcoin.

https://bitcoinmagazine.com/articles/understanding-the-lightning-network-part-building-a-bidirectional-payment-channel-1464710791
27  Other / Politics & Society / Fed records show dozens of cybersecurity breaches on: June 02, 2016, 03:27:19 PM
Fed records show dozens of cybersecurity breaches

The U.S. Federal Reserve detected more than 50 cyber breaches between 2011 and 2015, with several incidents described internally as "espionage," according to Fed records.

The central bank's staff suspected hackers or spies in many of the incidents, the records show. The Fed's computer systems play a critical role in global banking and hold confidential information on discussions about monetary policy that drives financial markets.

http://www.reuters.com/article/us-usa-fed-cyber-idUSKCN0YN4AM
28  Bitcoin / Press / [2016-06-02] Bitcoin.com Presents ‘Birds’: Promote Your Tweets With Bitcoin on: June 02, 2016, 02:57:36 PM
Bitcoin.com Presents ‘Birds’: Promote Your Tweets With Bitcoin

When you send out a tweet with the intention of having as many people as possible see it, you send some bitcoin along with it. People who retweet your post will receive some of the coin. That way, people get paid to spread your message.

The platform provides a win-win situation to the people participating because it’s easy money for people who retweet these messages, and relatively cheap marketing for those who are sending them out.

https://news.bitcoin.com/birds-promote-tweet-bitcoin/
29  Bitcoin / Press / [2016-06-02] Bitcoin to be sold in Australian newsstands over the counter on: June 02, 2016, 02:51:29 PM
Bitcoin to be sold in Australian newsstands over the counter

Australians will soon be able to buy some Bitcoin along with the newspaper and a pack of gum.

Launching Thursday, a new initiative will help people buy Bitcoin with cash at around 1,200 newsagents nationally, Fairfax Media reported.

http://mashable.com/2016/06/02/bitcoin-newsagency-australia/#z7eB_M_kUZqw
30  Bitcoin / Press / [2016-06-02] Video: Blockchain needs a native digital asset on: June 02, 2016, 02:41:34 PM
Blockchain needs a native digital asset

https://www.finextra.com/videoarticle/1241/blockchain-needs-a-native-digital-asset



nice girl + bitcoin. what do you want more?
31  Bitcoin / Press / [2016-06-02] Video: Bitcoin Blockchain.info Commercial Ad on: June 02, 2016, 02:36:13 PM
Bitcoin Blockchain.info Commercial Ad

https://www.youtube.com/watch?v=1_W-7hd4T2I
32  Bitcoin / Press / [2016-06-02] Blockchain Evangelists Plot Retreat to Richard Branson's Island on: June 02, 2016, 02:35:16 PM
Blockchain Evangelists Plot Retreat to Richard Branson's Island

Richard Branson’s private island in the Caribbean is set to host yet another blockchain-focused gathering, drawing a range of guests from around the world including the former prime minister of Haiti and a member of the European Union Parliament.

http://www.coindesk.com/blockchain-richard-bransons-necker-island/
33  Bitcoin / Press / [2016-06-01] Video: Bitcoin in the News - Episode 2 on: June 01, 2016, 04:59:04 PM
Bitcoin in the News - Episode 2

https://www.youtube.com/watch?v=5j69EwG8R8I&feature=youtu.be
34  Bitcoin / Bitcoin Discussion / Re: Video: Block [halving] party promo - Israel 2016 on: June 01, 2016, 04:18:59 PM
It's gonna be funny when the halvening comes and nothing even happens other than a bunch of mining operations being forced to shut off.

i guess that will be the case - nothing happens. but nothings happens to mining too i think  Smiley
i dont think you will see a big change in mining diff at all.
35  Bitcoin / Bitcoin Discussion / Re: Satoshi is back - and he likes art! on: June 01, 2016, 03:41:21 PM

correct.

i did not know that Dorian is still active in the bitcoin sphere.  Huh
36  Bitcoin / Bitcoin Discussion / Re: Video: Block [halving] party promo - Israel 2016 on: June 01, 2016, 03:39:50 PM
Block [halving] party promo - Israel 2016

https://www.youtube.com/watch?v=IEcd_Ecntro

Ok, so what about it? You constantly make threads without saying anything. Do you hate it, love it, are you Israeli and proud of your people?

Do you have any comment on this post at all?  If this is just a meetup announcement it's in the wrong section.

I just share. Make your own opinion  Wink
37  Other / Politics & Society / This ‘Demonically Clever’ Backdoor Hides In a Tiny Slice of a Computer Chip on: June 01, 2016, 03:24:24 PM
This ‘Demonically Clever’ Backdoor Hides In a Tiny Slice of a Computer Chip

Security flaws in software can be tough to find. Purposefully planted ones—hidden backdoors created by spies or saboteurs—are often even stealthier. Now imagine a backdoor planted not in an application, or deep in an operating system, but even deeper, in the hardware of the processor that runs a computer. And now imagine that silicon backdoor is invisible not only to the computer’s software, but even to the chip’s designer, who has no idea that it was added by the chip’s manufacturer, likely in some farflung Chinese factory. And that it’s a single component hidden among hundreds of millions or billions. And that each one of those components is less than a thousandth of the width of a human hair.

In fact, researchers at the University of Michigan haven’t just imagined that computer security nightmare; they’ve built and proved it works. In a study that won the “best paper” award at last week’s IEEE Symposium on Privacy and Security, they detailed the creation of an insidious, microscopic hardware backdoor proof-of-concept. And they showed that by running a series of seemingly innocuous commands on their minutely sabotaged processor, a hacker could reliably trigger a feature of the chip that gives them full access to the operating system. Most disturbingly, they write, that microscopic hardware backdoor wouldn’t be caught by practically any modern method of hardware security analysis, and could be planted by a single employee of a chip factory.

“Detecting this with current techniques would be very, very challenging if not impossible,” says Todd Austin, one of the computer science professors at the University of Michigan who led the research. “It’s a needle in a mountain-sized haystack.” Or as Google engineer Yonatan Zunger wrote after reading the paper: “This is the most demonically clever computer security attack I’ve seen in years.”
Analog Attack

The “demonically clever” feature of the Michigan researchers’ backdoor isn’t just its size, or that it’s hidden in hardware rather than software. It’s that it violates the security industry’s most basic assumptions about a chip’s digital functions and how they might be sabotaged. Instead of a mere change to the “digital” properties of a chip—a tweak to the chip’s logical computing functions—the researchers describe their backdoor as an “analog” one: a physical hack that takes advantage of how the actual electricity flowing through the chip’s transistors can be hijacked to trigger an unexpected outcome. Hence the backdoor’s name: A2, which stands for both Ann Arbor, the city where the University of Michigan is based, and “Analog Attack.”

Here’s how that analog hack works: After the chip is fully designed and ready to be fabricated, a saboteur adds a single component to its “mask,” the blueprint that governs its layout. That single component or “cell”—of which there are hundreds of millions or even billions on a modern chip—is made out of the same basic building blocks as the rest of the processor: wires and transistors that act as the on-or-off switches that govern the chip’s logical functions. But this cell is secretly designed to act as a capacitor, a component that temporarily stores electric charge.

This diagram shows the size of the processor created by the researchers compared with the size of malicious cell that triggers its backdoor function.
This diagram shows the size of the processor created by the researchers compared with the size of malicious cell that triggers its backdoor function.University of Michigan

Every time a malicious program—say, a script on a website you visit—runs a certain, obscure command, that capacitor cell “steals” a tiny amount of electric charge and stores it in the cell’s wires without otherwise affecting the chip’s functions. With every repetition of that command, the capacitor gains a little more charge. Only after the “trigger” command is sent many thousands of times does that charge hit a threshold where the cell switches on a logical function in the processor to give a malicious program the full operating system access it wasn’t intended to have. “It takes an attacker doing these strange, infrequent events in high frequency for a duration of time,” says Austin. “And then finally the system shifts into a privileged state that lets the attacker do whatever they want.”

That capacitor-based trigger design means it’s nearly impossible for anyone testing the chip’s security to stumble on the long, obscure series of commands to “open” the backdoor. And over time, the capacitor also leaks out its charge again, closing the backdoor so that it’s even harder for any auditor to find the vulnerability.
New Rules

Processor-level backdoors have been proposed before. But by building a backdoor that exploits the unintended physical properties of a chip’s components—their ability to “accidentally” accumulate and leak small amounts of charge—rather than their intended logical function, the researchers say their backdoor component can be a thousandth the size of previous attempts. And it would be far harder to detect with existing techniques like visual analysis of a chip or measuring its power use to spot anomalies. “We take advantage of these rules ‘outside of the Matrix’ to perform a trick that would [otherwise] be very expensive and obvious,” says Matthew Hicks, another of the University of Michigan researchers. “By following that different set of rules, we implement a much more stealthy attack.”

The Michigan researchers went so far as to build their A2 backdoor into a simple open-source OR1200 processor to test out their attack. Since the backdoor mechanism depends on the physical characteristics of the chip’s wiring, they even tried their “trigger” sequence after heating or cooling the chip to a range of temperatures, from negative 13 degrees to 212 degrees Fahrenheit, and found that it still worked in every case.

The experimental setup the researchers used to test their backdoored processor at different temperatures.
Here you can see the experimental setup the researchers used to test their backdoored processor at different temperatures.University of Michigan

As dangerous as their invention sounds for the future of computer security, the Michigan researchers insist that their intention is to prevent such undetectable hardware backdoors, not to enable them. They say it’s very possible, in fact, that governments around the world may have already thought of their analog attack method. “By publishing this paper we can say it’s a real, imminent threat,” says Hicks. “Now we need to find a defense.”

But given that current defenses against detecting processor-level backdoors wouldn’t spot their A2 attack, they argue that a new method is required: Specifically, they say that modern chips need to have a trusted component that constantly checks that programs haven’t been granted inappropriate operating-system-level privileges. Ensuring the security of that component, perhaps by building it in secure facilities or making sure the design isn’t tampered with before fabrication, would be far easier than ensuring the same level of trust for the entire chip.

They admit that implementing their fix could take time and money. But without it, their proof-of-concept is intended to show how deeply and undetectably a computer’s security could be corrupted before it’s ever sold. “I want this paper to start a dialogue between designers and fabricators about how we establish trust in our manufactured hardware,” says Austin. “We need to establish trust in our manufacturing, or something very bad will happen.”

https://www.wired.com/2016/06/demonically-clever-backdoor-hides-inside-computer-chip/
38  Bitcoin / Press / [2016-06-01] Jeff Garzik's Bloq runs smart contracts on: June 01, 2016, 03:10:54 PM
Jeff Garzik's Bloq runs smart contracts like an 'Ethereum plug-in for Bitcoin'

Bloq, the company founded by long-time Bitcoin core developer Jeff Garzik, covers a lot of ground across the public and private blockchain space, including the promise of Turing-complete smart contracts plugged into Bitcoin, written in JavaScript and Python.

http://www.ibtimes.co.uk/jeff-garziks-bloq-runs-smart-contracts-like-ethereum-plug-bitcoin-1561976
39  Bitcoin / Bitcoin Discussion / Satoshi is back - and he likes art! on: June 01, 2016, 03:04:02 PM
40  Bitcoin / Press / [2016-06-01] The Five Most Useful Properties of Bitcoin on: June 01, 2016, 03:01:23 PM
The Five Most Useful Properties of Bitcoin

Bitcoin has received plenty of hype as the money of the future over the past few years, but what are the properties of this digital asset that set it apart from everything else on the market? What are the features of Bitcoin that get people to use it in the first place?

http://www.nasdaq.com/article/the-five-most-useful-properties-of-bitcoin-cm628531
Pages: « 1 [2] 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 695 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!